Data Security Bundle Installation Service for ECS
Dell SKU: AD154080 | Superna Product Code: EYEGLASS-P032-INS
Overview
This service is designed for customers who have purchased the Data Security Bundle for Dell ECS and need installation and configuration assistance deploying the Ransomware Defender feature.
- Service Delivery: Remote sessions for audio, video, and screen sharing via Zoom, VPN, or alternate remote access to the customer's ECS equipment. Estimated three (3) hours over a span of 1–2 days with dedicated customer technical resources.
- Operating Hours: Monday to Friday, 9 am – 4 pm in your local time zone, excluding major holidays.
- Service Scope: Covers a single clustered ECA agent installation and configuration, with up to 2 collocated ECS Clusters.
- Terms and Conditions:
- Exclusions:
- This is not a consulting service. Superna resources are not authorized to provide design recommendations for Disaster Recovery features.
- Hands-on changes to external IT components, such as DNS, Active Directory, ECS, or other non-Superna supplied products.
- Service delivery requires customers to have hands-on knowledge of all external IT components.
Prerequisites
- Complete a Pre-Installation Questionnaire Form.
- Send a scheduling request to services@superna.net.
- Core Agent Appliance is installed.
- On the day of installation, confirm availability of the DNS administrator to make changes if the above steps require debugging or were misconfigured.
- Firewall ports opened as per documentation for ECA clusters.
Service Methodology Flow
ECA (Extended Cluster Agent) Installation and Configuration
-
ECA Agents Installation Phase — Remote installation with customer to accomplish the following:
- Prerequisite — Gather site installation requirements from the submitted installation questionnaire.
- Configuration Phase — Remote
- Apply license.
- Edit configuration file on agent startup.
- Start up clustered agent code.
- Completed.
Ransomware Defender
-
Test and Configuration Phase
- Configure the Security Guard feature:
- Validate successful execution.
- Configure schedule.
- Knowledge transfer on log file validation for Security Guard.
- Enable monitor mode to baseline user behavior.
- Review the Security Assessment on the Enforcement section in the admin guide.
- Over 2–3 weeks, schedule validation sessions: Health Check and Knowledge Transfer.
- Configure the Security Guard feature:
-
Knowledge Transfer Phase
- How to enable production mode.
- Operational cluster management section.
- How to process security incidents workflow from the admin guide — How to respond to Security Events for Warning, Major, or Critical Events.
- How and when to make whitelist changes when introducing new server applications that write data to ECS.
- UI walkthrough.